summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatthias Fechner <mfechner@FreeBSD.org>2023-05-02 23:09:29 +0300
committerMatthias Fechner <mfechner@FreeBSD.org>2023-05-02 23:09:52 +0300
commit7afb635fcb0dcf52e1e7a714764a2b72b64004a0 (patch)
tree04e9a36ba471546b537691104713b3f96b0015b2
parentdevel/rubygem-mini_portile2: Update to 2.8.2 (diff)
security/vuxml: document gitlab-ce vulnerabilities
-rw-r--r--security/vuxml/vuln/2023.xml44
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 952d2cfe7ac3..f99f293f1b97 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,47 @@
+ <vuln vid="4ffcccae-e924-11ed-9c88-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>15.11.0</ge><lt>15.11.1</lt></range>
+ <range><ge>15.10.0</ge><lt>15.10.5</lt></range>
+ <range><ge>9.0</ge><lt>15.9.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/releases/2023/05/02/security-release-gitlab-15-11-1-released/">
+ <p>Privilege escalation for external users when OIDC is enabled under certain conditions</p>
+ <p>Account takeover through open redirect for Group SAML accounts</p>
+ <p>Users on banned IP addresses can still commit to projects</p>
+ <p>User with developer role (group) can modify Protected branches setting on imported project and leak group CI/CD variables</p>
+ <p>The Gitlab web interface does not guarantee file integrity when downloading source code or installation packages from a tag or from a release.</p>
+ <p>Banned group member continues to have access to the public projects of a public group with the access level as same as before the ban.</p>
+ <p>The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.</p>
+ <p>XSS and content injection and iframe injection when viewing raw files on iOS devices</p>
+ <p>Authenticated users can find other users by their private email</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-2182</cvename>
+ <cvename>CVE-2023-1965</cvename>
+ <cvename>CVE-2023-1621</cvename>
+ <cvename>CVE-2023-2069</cvename>
+ <cvename>CVE-2023-1178</cvename>
+ <cvename>CVE-2023-0805</cvename>
+ <cvename>CVE-2023-0756</cvename>
+ <cvename>CVE-2023-1836</cvename>
+ <cvename>CVE-2022-4376</cvename>
+ <url>https://about.gitlab.com/releases/2023/05/02/security-release-gitlab-15-11-1-released/</url>
+ </references>
+ <dates>
+ <discovery>2023-05-02</discovery>
+ <entry>2023-05-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="02562a78-e6b7-11ed-b0ce-b42e991fc52e">
<topic>cloud-init -- sensitive data exposure in cloud-init logs</topic>
<affects>